Email campaign with malware: Javascript downloaders instead of executables as attachments

Several types of emails are being sent with a ZIP attachment containing a single file with this mask: <number>.doc.js.

js-spam

 

Here is as text. Apparently, Google loves text because it can index it better, so I am doing here some SEO 🙂

 

Notice to Appear,

You have not paid for driving on a toll road. 
Please, do not forget to service your debt.

The copy of the invoice is attached to this email.

Yours faithfully,
Sean Worley,
E-ZPass Manager.

-------------------------------
Notice to Appear,

This is to inform you to appear in the Court on the August 22 for your case hearing.
Please, prepare all the documents relating to the case and bring them to Court on the specified date.
Note: The case will be heard by the judge in your absence if you do not come.

You can find the Court Notice is in the attachment.

Regards,
Kenneth Mccormick,
District Clerk.

----------------
Notice to Appear,

You have to appear in the Court on the August 23.
Please, do not forget to bring all the documents related to the case.
Note: The case will be heard by the judge in your absence if you do not come.

You can find the Court Notice is in the attachment.

Yours faithfully,
Roberto Heath,
Clerk of Court.

This is how the JS document looks like:
malware

 

The content is being detected by many AV software as TrojanDownloader:JS/Nemucod.P or simply as Downloader. Surprisingly, only 28 out of 56 AV detect it. So, 50%… I am disappointed.

Well, since now I uploaded it for the first time, all of them will, fortunately, detect it soon.

 


© Copyright 2015 Sorin Mustaca, All rights Reserved. Written For: Sorin Mustaca on Cybersecurity


Check www.endpoint-cybersecurity.com for seeing the consulting services we offer.

Visit www.itsecuritynews.info for latest security news in English
Besuchen Sie de.itsecuritynews.info für IT Sicherheits News auf Deutsch